Rewterz
Rewterz Threat Alert –Cobalt Strike Malware – Active IOCs
September 1, 2021
Rewterz
Rewterz Threat Alert – SNAKE Ransomware – Active IOCs
September 1, 2021

Rewterz Threat Alert – FormBook Malware – Active IOCs

Severity

Medium

Analysis Summary

FormBook is an information-stealer malware that has been active since 2016. The info-stealer malware’s capabilities include stealing credentials, capturing screenshots of victim’s desktop, monitoring clipboard, keystroke logging, clearing browser cookies, downloading and executing files, uploading and removing bots, launching commands via ShellExecute, downloading and unpacking ZIP archive, rebooting and shutting down the system. The attackers behind these email campaigns used a variety of distribution techniques to deliver the FormBook info-stealer, including PDFs, Office Documents, ZIP, RAR, etc. Some of these files are related to quotation requests.

Impact

  • Credential theft
  • Keystroke logging
  • Data Theft

Indicators of Compromise

MD5

  • 1f9db0137245508d4ad475170c4811f5
  • 3e8d4e3c6a76baa15bd50d4de32ac0f9
  • 53b8c0b31af3ba5de658c119e39f73bc
  • 7b51d08670290644b055079e33e791f4
  • 231205f428a2d33873ffc97ac2fcbfab
  • c00f3a742e38444e5aa7a547ca3a15fd
  • 4687367e47aef2eaf8e4df70c1e39553

SHA-256

  • 24d79b2f4a2aba518237343b7b94b817f51de0afc1e40236a4c267657b113849
  • 647c043687621e012ac9c04a69fe8590198d8e8e369431723dc848436438939a
  • 4311e97e616734f94d1aa4d38f37679749ae84513d132aee134fbc364d25b6ec
  • 72362ee916d9697bac201fb3de3c8c736725e4c35c0cab9adb7fd5f184e9b2e1
  • 2ee41ce35bbd3f5a2cb2e8bde13acc7511da2916a362304b48a8b4f2a6529bab
  • 0dca8d2ca04898823c4d8d6db30a6c1652a1dc53168f301e4a9eb1f1f7bc1643
  • 954ff60aa2edd186cecb8f5bb11ec77cd10c4bc46ef49861434477439bffa088

SHA-1

  • 7f8f0bbd941bc101a114220e4f296bd58a96a494
  • e5d70ed0cdbd9041560b56e473277fd471a6a9d0
  • 946d13ae1bcc275b3b1e3542b08f04803a93b50a
  • 7166acd23ebed6ac87c2aa0cd035eec56b3b40a7
  • ee85bf12a0bce528a79dd2345633f93028f3717d
  • 80c97b1b071651e7456cc018a2f3dee73e56ca06
  • 5be9db64aae257077c26075c5c36c9a6eab4fdbb

Remediation

  • Block all threat indicators at your respective controls.
  • Search for IOCs in your environment.